Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Navigating the SOC landscape: Optimisation or evolution?

In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.

DeepSeek - Necessity is the mother of innovation (as well)

The US government’s bipartisan effort to limit China’s access to advanced semiconductors began under Trump and escalated under Biden, aiming to curb China’s military tech and AI. However, DeepSeek’s rise challenges US AI leadership. Join our expert panel to explore its impact on the Sino-US tech race.

Why traditional vulnerability management fails: Switching to risk-based

Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.

Navigating insider risks in an AI-driven world

Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.

Dirty deployment: Nobody puts Apple in the corner - leveraging macOS telemetry

A Mac deployed without visibility is like a dance without rhythm – you are bound to miss a step. Watch now to learn how macOS telemetry ensures compliance, accelerates investigations, and enables proactive threat hunting. With the right tools, you can integrate Apple into your security strategy, because nobody should put Apple in the corner.

Proactive cyber resilience: Stopping threats before they ignite

Explore why breaches happen and how to respond faster with advanced disruption techniques and automation. We’ll provide actionable insights on detection, disruption and containment, minimising damage, and continuous improvement. Make your organisation too costly a target for attackers to bother with.

Defending against insider threats with a behaviour-based approach

Insider threats pose significant risks, leading to substantial financial losses (averaging $701.5k per incident) and reputational damage. Discover how user and entity behaviour analytics (UEBA) tools powered by AI detect abnormal behaviours, enhancing security alongside your proactive awareness culture.

Fake IDs and bad behaviour: Containing rogue actors with mature TDR

Would your cyber setup stop a threat actor with stolen user MFA credentials? Explore this expanding market, the most recent tactics for capturing details, and why speed is of the essence. We’ll look at attack disruption scenarios as well as a model for gauging your threat detection & response maturity.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue